Lindell's Cyber Symposium was a massive success

Posted by DC on Fri, 08/13/2021 - 16:25

For the love of God, stop listening to the fake news.  Lindell put on an incredible event that made the most impact on the election, probably since election night.

First, the packet capture data.  No we didn't see the data, but we didn't see it because the enemy was launching a counter-attack as the event was happening.  The data would have been corrupted in some way, which would have significantly hurt the cause.

This doesn't make the data go away; it just pushes us back.  The disappointed cyber guys who left empty handed will still have an opportunity to pour over the data, as they're already engaged.

For those on our side, please stop saying we have stuff "better" than the PCAPs.  Just... stop.  You're making us look dumb.

Nothing beats packet captures containing the raw data sent across the wire.  The countless times I've had to do packet analysis, I've never said "I don't need to see the data, I'm good with just the server config and some log files".

Log files are the report on your home alarm that tells you when a door or window was opened.  The packet captures are like the phone conversation recording between the burglars saying they're going to rob your house, along with the geolocation data from their phones to match up with the logs.

The word on the street is a guy named Josh Merritt was key in saving the entire thing:



Instead of complaining that you didn't see the data as it was "promised", maybe give Mr. Merritt a thank you for what he did?

Imagine how much of a disaster it would have been if corrupted data was dished out to the cyber analysts, and the never-Trump/RINO clowns would have, for once in their loser lives, had something tangible to parrot, albeit at the hands of sabotage.

Merritt preserved the integrity of the process.  So, we have to wait for analysis of the packet captures.  Life is hard sometimes.

Meanwhile, legislators from all 50 states were in attendance.  This point always fascinates me, but according to the pundits who attended who've been engaged on the audits and election-related happenings, they say many of these legislators and state officials were hearing this stuff for the first time.

I say they need to get closer to their constituents, but it's good they attended and are fired up.  In fact, these legislators from various states started an "election caucus", where they'll collectively strategize on how to bring about audits in their states.  I think that's a big deal.

Seth Keshel had an amazing non-tech segment that can be used for red-pilling purposes.  Spread this one around:



CodeMonkey had a segment where he showed two images (a snapshot of the state of a machine) from a machine from Mesa County, Colorado.  The images showed the machine state (file directory to be specific) before an update, and after.

While it showed the machine definitely changed, there really wasn't much there.  They showed an entry of an HTTP request coming across port 80, but could that have been a local request?

The "dehardening" script may not be anything special.  I've had to test things and disable security features in a script, so that doesn't tickle my fancy too much.

CodeMonkey traversing the directory structure cold won't really tell us anything, so I wouldn't draw hard conclusions before the machine is investigated forensically.  I did, however, find it interesting that he though they had the packet captures that were involved with the machine.

Do I believe it's everything they said and it was connected to the network?  Yes, as this is old news from Michigan (and Wisconsin -- enjoy the desperation dense in this article), but it's more corroborating (soon-to-be) evidence.  We also now have a whistle-blower from Detroit, with photos of the machines connected to the internet.

One of the biggest stories was out of Colorado.  The Secretary of State was caught red-handed in leaking the passwords for the purpose of framing a subordinate, who spoke at Lindell's event.

As she was heading to Sioux Falls, her office was raided, but she got ahead of the narrative.  Remember, the media and the state officials are working as a team.  The main fact of that story is the only person on the planet who had possession of that password was the Secretary of State.

The state legislators also heard from Joe Oltmann, and how he's been targeted by a corrupt judge who is a BLM activist (attended riots, etc).  This one hit home, apparently:



There were a few that I haven't had a chance to watch yet, but I will.  One was the election breakdown with Draza Smith, and the other was David Clements' segment.  I heard both were very strong.

Mike Lindell is trying to slay a demonic dragon.  The loser pundits who are crapping on the event don't really care about packet captures, and don't even know what they are.  They just want to use Lindell as a means to putting forth a display of objectivity by crapping on him.

If you want to crap on Lindell and criticize the event over the problems they had or format, let's see you put one together.  Be part of the solution, not the problem.  

These are almost always never-Trumpers who voted for Evan McMullin.  Ignore these clowns.  Lindell's event was a massive success and educated a lot of people, most of whom, importantly, are state legislators and officials.

The cyber guys will be able to get their hands on the data soon.


Share on Telegram

Recent Articles